Privacy Guardhttp://www.privacyguard.net
The Privacy Guard Blog - Privacy issues facing AmericaFri, 16 Nov 2018 03:58:23 +0000en-UShourly1https://wordpress.org/?v=4.9.8Privacy Issues with the iPhone Xhttp://www.privacyguard.net/2018/04/05/privacy-issues-with-the-iphone-x/
http://www.privacyguard.net/2018/04/05/privacy-issues-with-the-iphone-x/#respondFri, 06 Apr 2018 03:37:23 +0000http://www.privacyguard.net/?p=3555The launch of the iPhone X brought along with it a revolutionary unlock feature, known to many as the facial recognition scanner. With the Face ID, the iPhone X users can unlock their phone by utilizing its front camera to scan their unique facial feature. This is a step up from the fingerprint sensor. While it does sound convenient for the users to unlock their phones, there have been some concerns especially voiced by privacy experts regarding the protection of privacy that the device itself provides. Of course, the Face ID prevents people from accessing your phone, but is the data of your facial features protected from going out from your device and falling into the wrong hands? Here, we will take a closer look at the storage of the data of your facial scan, as well as how Apple handles it in its latest smartphone.

Before we even get into the issue, we should address whether the Face ID does provide adequate protection in the first place. Apple claims that the Face ID is secure, as it should be, and that touting internal data shows a very low chance (one in a million) that the phone will unlock with a different person’s face. To unlock the phone, the device stores the user’s face scan inside on a secure enclave[1]. That means your facial data remains inside the device. However, one cannot dismiss the possibility that app developers can, albeit limited, access that data.

Here, some technology commentators are worried about who can have access to the sensor. One potential use of the sensor for advertisers, according to Geoffrey Fowler in his review for the Washington Post, is the fact that they can use the camera to determine exactly where the user is looking on the screen during their advertisements if you are looking at them at all. He also mentioned that the Apple’s terms for app developers forbid them from accessing the camera without permission or use the face data for advertising. Moreover, Fowler pressed the Apple executives and saw one positive change: applications that use the face data are required to publish a privacy policy. However, how well that protects the user’s privacy remains to be seen.

Apple actually allows app developers to take certain facial data from the phone and store it on the developer’s own server, as long as they ask the user for their permission, and not sell that data to third parties. Although the data access is limited, the app developers can capture a rough map of the user’s face and numerous expressions. That means the app developers can and will know when you smile, blink, or raise an eyebrow.[2]

According to the documentation about the face unlock system which Apple released to security researchers, the data of the user’s face that is accessible to the developers cannot be used to unlock a phone. To unlock the phone, a mathematical representation of the face is required as opposed to the requirement of a visual map of the face[3]. At least, that means app developers cannot remotely unlock your phone and access your data. Still, the fact that the authentication data can be shared does not sit well with everyone.

This is where the privacy protection becomes really questionable. By enabling app developers to store the user’s rough facial data on their own server, just how well can Apple enforce their privacy protection rule upon those developers? After all, advertisers need the facial data to tell whether their advertisements are effective, or to simply study their target audience.

Apple remains firm that they are sure that their enforcement tools, which are pre-publication reviews, audits of applications, and the threat of removing the app from the app store, are effective. The problem here is that Apple does not thoroughly review the source code of the applications, according to 2011 Congressional testimony from Bud Trible. Moreover, Apple relies instead on random spot checks or complaints, which is a very ineffective means of defense against privacy abuse. When it comes to privacy policies published by the application developer, it is long and complex, and it will most likely not be read by the users.

Another means of enforcement is the threat of kicking apps out of the App Store. While it is true that Apple has a good record of holding developers accountable for their violations, the challenge here is the fact that Apple has to find them first, according to American Civil Liberties Union’s Stanley. While these enforcement rules may seem strong on paper, in actuality, small application developers will most likely follow Apple’s rules. Still, larger companies like Uber, have a record of breaking Apple’s rules[4]. That brings Apple’s enforcement mechanism into question.

All-in-all, the introduction of the Face ID authentication system is, without a doubt, revolutionary in the race to smartphone supremacy. However, one should not dismiss the security flaws offered by new, and flashy technologies. Here, the user’s privacy may not be as protected as they think. While Apple does have its defense mechanisms against privacy violations from application developers, their effectiveness remains to be seen.

]]>http://www.privacyguard.net/2018/04/05/privacy-issues-with-the-iphone-x/feed/0The Benefit of using a VPNhttp://www.privacyguard.net/2017/09/03/the-benefit-of-using-a-vpn/
http://www.privacyguard.net/2017/09/03/the-benefit-of-using-a-vpn/#respondMon, 04 Sep 2017 01:37:07 +0000http://www.privacyguard.net/?p=3543A VPN (Virtual Private Network) is a technique of accessing the internet through a private network and not the typical ISP. The VPN encrypts all the information it receives from your computer, phone or tablet such that no one else can access it. This method was initially used by businesses that wanted to share information and data with employees even when they were at home or abroad. Employees could still log in to the networks, access data, share and work on projects just as they would have done if they were in the office.

Nowadays, the VPN service is being used more for private reasons than to share data. The ease of the exchange of information and conducting transactions online has more people choosing to operate online than offline. You can make payments, close deals and pursue leads from the comfort of your phone or tablet from anywhere in the world. You no longer need to meet people face to face to conduct business.

The ease that comes with online transactions has seen more people resulting to using public networks in cyber cafes, restaurants, and airports. It is possible to transact business but how safe is it from hackers. If you want to secure your connections, then a VPN should be your ideal choice. The VPN service provider gives you a new IP address and encrypts data so that no one can access any of your online activity. What are the benefits?

Improved Security

It is estimated that cyber crime has risen from zero to over 125% in 2015 and no one is safe. The 2017 attack on Gmail where logging details for over a million accounts were collected just shows how smart attackers have become. To secure your information, you need to use a VPN. Only you and the VPN provider can access the information. Some governments require VPN providers to store log information for all their clients, therefore, the need to choose a VPN that does not store data such as those found in the USA. When using public networks, make sure a VPN protects you.

Privacy

You can use the internet without worrying about someone checking what you have been up to. If you want to download from your computer at work, a VPN will ensure that no one can retrace your online footsteps. Also, your passwords, details, and information are secure. When you want to make purchases or send sensitive information, you are assured that no one else can access it. Since the VPN gives you a different IP address, it will be hard to detect your location. You can be in South Africa, yet the VPN address indicates that you are located somewhere in UK or any other place of choice. The data is encrypted meaning that no one can read it.

No More Online Barriers

Some websites are only accessible to specified countries. If you want to check them out or get a hold of channels that you would otherwise not access from your country, a VPN can benefit you. It gives you an IP address in the desired country. This enables you to access the internet as if you are located there.

On the same note, some countries limit internet access to some websites. When you visit these countries, you want to be able to browse just as you used to in your mother country. For instance, China limits access to Facebook, Twitter YouTube among other sites. A VPN will help you disguise your IP address when you visit the country enabling you to access the restricted sites. Locals in China also use VPN to access the same sites.

Business owners can also benefit from using a VPN, especially when communicating with clients. When they have to move from one country to another, they can still maintain the VPN of their business location. This means that all emails and correspondence to the clients will be from one central location address.

Customers can raise eyebrows, and some even avoid transacting with you when they notice the different places you operate from. They may think that you might not be available when they need you. Getting a VPN is quite important when communicating to new clients or prospects.

More Productivity

Companies offer their employees VPN providers to enable them access information even when they are at home or away for holiday and business. It allows employees to carry on with work even after they have left the office. Students can also access information while away from school. The free VPN provided for by a company can also be used for security purposes when accessing public networks such as airport WIFI.
Clients Can Trust You More

Because of the many cyber-attacks, customers might hesitate before they give you their details. You can assure them of the security measures you have put in place such as using a VPN provider to secure their data. The recent attacks on the IRS system have left many worried about the safety of their information.

It is Affordable

When you consider all the benefits you get when using a VPN, putting aside about $10.99 every month will be a worthy investment. There are free VPN providers, but the downside to using them is they make accessing the internet slower. This is because of having too many users accessing the system. Also, they display ads on your browser and can have a limited number of servers you can choose from. If you are new to VPN providers, you can choose the free versions, have a feel of how things work then upgrade.

You risk a lot when you do not protect your information online. Hackers are always on the lookout to find any vulnerable victims they can take advantage of. Do not be on the receiving side. Protect yourself with an affordable yet dependable VPN. You will be more comfortable accessing the internet from public networks. At the same time, you will be able to work at ease knowing that no one is looking over your shoulder.

We recommend Virtual Shield as a VPN provider. Don’t wait to protect your privacy and security.

Apple Inc. is now facing yet another conflict with the U.S. federal government as the latter stated that it would force the company to open an iPhone involved in a recent New York drug case. According to the Department of Justice (DOJ), the government continues to require the assistance of Apple in accessing the data that is authorized by a search warrant.
In line with this ongoing issue, Apple issued a statement through one of their legal counsels, saying that although disappointed, the company is not surprised by this movement, following what happened a few months ago after they stood firm to their decision not to unlock an iPhone used by one of the two terrorists in an attack in San Bernardino, California, where 14 people were gunned down at a party last December. The Federal Bureau of Investigation (FBI) identified one of the gunmen as Syed Farook who was then using an iPhone 5C. This phone was particularly important to the FBI because it may hold pieces of information that will help them solve the case.

Opposing Points of View

iPhone

Apple refused to unlock the phone even under the orders of U.S. Magistrate Sheri Pym to build a custom version of its iOS software that will run only on this specific iPhone. The company’s chief executive officer (CEO) Tim Cook argued that the order had gone too far and that bypassing the password means creating a “back door” in its operating system that could be used to unlock hundreds of millions of iPhones, thus undermining the security and privacy of its users.
The company stated that it is “certainly possible to create an entirely new operating system to undermine our features as the government wants” but Apple’s point was they cannot just circumvent the protection of this single phone and expect other phones to stay safe and secure from all kinds of security breaches. According to Cook, this order is equivalent to a master key, capable of opening a countless number of locks all around the world.
However, the FBI stood strong in saying that what they are requiring Apple to do is a way of fighting terrorists who are now using modern means of communication and technology to wreck havoc and cause chaos. They also stated that this order is a reasonable one so they may gain evidence but Apple would not cave in because all the company cared about was their business model and brand.
With regards to the custom iOS version being requested, the government filed on February 19 that, “Apple may maintain custody of the software, destroy it after its purpose under the order has been served, refuse to disseminate it outside of Apple, and make clear to the world that it does not apply to other devices or users without lawful court orders.”
Despite this statement, Apple executives believed that once this version is created, it would appear like an appealing eye candy for hackers. And they would not risk putting their servers in jeopardy because once a technique is produced in the digital world; it could be used countless of times on all kinds of devices. In addition, if ever they comply with the orders of FBI, the company saw this as a “dangerous precedent” wherein the government might resort to asking this in the future to bypass any security feature that keeps law enforcement from accessing the latest iPhone model.
In March, the FBI dropped its request for Apple to crack the iPhone used by Farook, saying they had found alternate methods to unlock the phone without the help of the company.

The New York Case

This drug case in New York involves another iPhone, belonging to a man identified as Jun Feng, that according to reports is much easier for Apple to break into. The DOJ is hoping that Apple will cooperate this time to unlock the phone so they may locate accomplices since they acknowledged that it could extract data from the phone without having to create custom software.
This persisting battle involves more than just iPhones. And while this issue still sparks debates and arguments, the question left unanswered is “How will Apple and the government see eye to eye?”

]]>http://www.privacyguard.net/2016/04/13/apple-vs-government-battle-between-tech-and-law/feed/0How to Encrypt and Decrypt Your Emailhttp://www.privacyguard.net/2015/03/21/how-to-encrypt-and-decrypt-your-email/
http://www.privacyguard.net/2015/03/21/how-to-encrypt-and-decrypt-your-email/#respondSun, 22 Mar 2015 04:43:15 +0000http://www.privacyguard.net/2015/03/21/how-to-encrypt-and-decrypt-your-email/Big shout out to Seth Davis. Hopefully this starts a wave of security that will help all the God fearing Jesus loving soldiers out there doing what they can. This tutorial is for firefox…

]]>http://www.privacyguard.net/2015/03/21/how-to-encrypt-and-decrypt-your-email/feed/0Privacy Online (subtitles)http://www.privacyguard.net/2015/03/21/privacy-online-subtitles/
http://www.privacyguard.net/2015/03/21/privacy-online-subtitles/#respondSun, 22 Mar 2015 04:43:14 +0000http://www.privacyguard.net/2015/03/21/privacy-online-subtitles/This film is part of the British Library’s schools project, Magna Carta: My Digital Rights, which is running between February and April 2015. This film is part of the British Library’s…

]]>http://www.privacyguard.net/2015/03/21/privacy-online-subtitles/feed/0USA: Govt can’t snoop on our online activity without warrant – Rand Paulhttp://www.privacyguard.net/2015/03/21/usa-govt-cant-snoop-on-our-online-activity-without-warrant-rand-paul/
http://www.privacyguard.net/2015/03/21/usa-govt-cant-snoop-on-our-online-activity-without-warrant-rand-paul/#respondSun, 22 Mar 2015 04:43:09 +0000http://www.privacyguard.net/2015/03/21/usa-govt-cant-snoop-on-our-online-activity-without-warrant-rand-paul/Kentucky Senator and possible presidential candidate Rand Paul set up an office for his RANDPAC political committee in Austin on Monday, following an address at South by Southwest (SXSW) over…

]]>http://www.privacyguard.net/2015/03/20/hu-dis-2015-dit-is-frank/feed/0Three Ways To Avoid Being Tracked Online | Glenn Beck Programhttp://www.privacyguard.net/2015/03/18/three-ways-to-avoid-being-tracked-online-glenn-beck-program/
http://www.privacyguard.net/2015/03/18/three-ways-to-avoid-being-tracked-online-glenn-beck-program/#respondThu, 19 Mar 2015 04:43:30 +0000http://www.privacyguard.net/2015/03/18/three-ways-to-avoid-being-tracked-online-glenn-beck-program/Here are three easy ways to avoid being tracked online. Watch full episodes of the Glenn Beck Program on demand with a subscription to TheBlaze TV: …

]]>http://www.privacyguard.net/2015/03/18/three-ways-to-avoid-being-tracked-online-glenn-beck-program/feed/0Employer’s Rights to Your Social Mediahttp://www.privacyguard.net/2015/03/18/employers-rights-to-your-social-media/
http://www.privacyguard.net/2015/03/18/employers-rights-to-your-social-media/#respondThu, 19 Mar 2015 04:43:28 +0000http://www.privacyguard.net/2015/03/18/employers-rights-to-your-social-media/Should employers be legally allowed to ask for employees’ and potential new hires’ social media passwords? There’s a bill on the floor of the Florida Legislature opposing this right for employers…